Chapter 35 resources for the Cyberlaw bookResources and Links for the book Cyberlaw: Law for Digital Spaces and Information Systems, by John Bandler

By John Bandler

This page has resources specific for this chapter.

Looking to navigate to another place?

Chapter 35 International cyber conflict and law

Chapter references, resources, and additional reading

Chapter questions

  • List three important parts of the law of war, as laid out in the chapter.
  • List the foundational document of international law.
  • Given the difficulties enforcing criminal law and civil law, what difficulties do you think are involved enforcing international laws? Explain.
  • Nation-states may have tremendous resources and have strong motives to achieve a goal. Does it surprise you they would use cyberspace? What types of cyber actions might they take?
  • What types of actions do nation-states take that we never hear about?
  • What types of cyber actions do you think nation-states are taking now?
  • What types of cyber actions do you think nation-states are planning, even if they do not intend to carry them out at this point?
  • Provide the link (showing the URL/webpage) to the Chapter 35 resource page.
  • There are laws about when nation-states can enter into armed conflict. Name the main document that lays out this law, and the sections, and provide links to those sections.
  • List the Latin name, then the plain English name for when it is lawful to use force to start/commence a war.
  • List the Latin name, then the plain English name for lawful conduct and use of force when in a war.
  • Did it surprise you to learn that there are laws about when to start a war? Briefly explain.
  • Did it surprise you to learn that there are laws about how a war should be conducted? Briefly explain.
  • What is the primary international law document on conflict?
  • What do you think about the analogy in the book between criminal law and use of force compared to international law and warfare? Briefly explain.
  • Did it surprise you to learn that existing laws of war can be applied to cyberconflict? Briefly explain.
  • What is the relevance of Estonia to cyberconflict and the legal discipline of international cyberconflict?
  • Why does the Tallinn Manual have "Tallinn" in the name?
  • The U.S. government is granted far more authority and secrecy for national security investigations compared to criminal investigations. What is the rationale for that?
  • Do you think foreign nation-states are investing resources to influence the way people within the U.S. think, including their opinion of current events? Briefly explain.
  • Write out the full name of the center in Estonia mentioned in the chapter, including acronym (typing every character yourself as always)
  • List the four areas of legal tools and legal boundaries laid out in the chapter.

Links and information

This page is hosted at https://johnbandler.com/cyberlawbook-resources-ch35, copyright John Bandler, all rights reserved.

Originally posted 11/23/2024.  Updated 04/14/2025.